Preferred Language
Articles
/
axfH5JMBVTCNdQwC3-tZ
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 19 2017
Journal Name
Al-khwarizmi Engineering Journal
Improve Wear Resistance on Al 332 Alloy Matrix- Micro -Nano Al2O3 Particles Reinforced Composite
...Show More Authors

The wear behavior of alumina particulate reinforced A332 aluminium alloy composites produced by a stir casting process technique were investigated. A pin-on-disc type apparatus was employed for determining the sliding wear rate in composite samples at different grain size (1 µm, 12µm, 50 nm) and different weight percentage (0.05-0.1-0.5-1) wt% of alumina respectively. Mechanical properties characterization which strongly depends on microstructure properties of reinforcement revealed that the presence of ( nano , micro) alumina particulates lead to simultaneous increase in hardness, ultimate tensile stress (UTS), wear resistances. The results revealed that UTS, Hardness, Wear resistances increases with the increase in the percentage of

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Hybrid Filter for Enhancing Input Microphone-Based Discriminative Model
...Show More Authors

Voice denoising is the process of removing undesirable voices from the voice signal. Within the environmental noise and after the application of speech recognition system, the discriminative model finds it difficult to recognize the waveform of the voice signal. This is due to the fact that the environmental noise needs to use a suitable filter that does not affect the shaped waveform of the input microphone. This paper plans to build up a procedure for a discriminative model, using infinite impulse response filter (Butterworth filter) and local polynomial approximation (Savitzky-Golay) smoothing filter that is a polynomial regression on the signal values. Signal to noise ratio (SNR) was calculated after filtering to compare the results

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 23 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of Andrews' six keys of normal occlusion in a sample of Iraqi adults in Baghdad city
...Show More Authors

Background: The Andrews’ six keys of normal occlusion contribute individually and collectively to the total scheme of occlusion and, therefore, are viewed as essential to successful orthodontic treatment. The present research aims to evaluate the presence of the parameters of the Andrews’ Six Keys of normal occlusion in a sample of 100 Iraqi adults with complete permanent dentition and clinically acceptable normal occlusion (Angle’s Class I) in Baghdad city. Their age range 18-25 years (60 males and 40 females). Materials and methods: Each patient was subjected to clinical examination and then study cast models were made, with their occlusal records. The measuring tools that have been used involved: Three-dimensional goniometer to me

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 31 2022
Journal Name
Iraqi Geological Journal
Development of New Models to Determine the Rheological Parameters of Water-Based Drilling Fluid using Artificial Neural Networks
...Show More Authors

It is well known that drilling fluid is a key parameter for optimizing drilling operations, cleaning the hole, and managing the rig hydraulics and margins of surge and swab pressures. Although the experimental works represent valid and reliable results, they are expensive and time consuming. In contrast, continuous and regular determination of the rheological fluid properties can perform its essential functions during good construction. The aim of this study is to develop empirical models to estimate the drilling mud rheological properties of water-based fluids with less need for lab measurements. This study provides two predictive techniques, multiple regression analysis and artificial neural networks, to determine the rheological

... Show More
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Peer Education Strategy and its Impact on the Development of Skill of Perspective Drawing
...Show More Authors

       After the twenty – first century become  necessary for us motorcade era in educational a chevements by searching  for the best  strategies and teaching methods and  techniques  artotalbagesh  resorting to the strategy

Did not use in use in the teaching of the foreseeable  material  general by voice and teaching  perspective  for the student of the class fourth science

In particular ,so the researcher asking the question follows:

Can the peer education strategy to have an impact in perspective drawing skill development ?

   From here it demonstrated the importance of current research know the impact of  p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 21 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

In this paper, three approximate methods namely the Bernoulli, the Bernstein, and the shifted Legendre polynomials operational matrices are presented to solve two important nonlinear ordinary differential equations that appeared in engineering and applied science. The Riccati and the Darcy-Brinkman-Forchheimer moment equations are solved and the approximate solutions are obtained. The methods are summarized by converting the nonlinear differential equations into a nonlinear system of algebraic equations that is solved using Mathematica®12. The efficiency of these methods was investigated by calculating the root mean square error (RMS) and the maximum error remainder (𝑀𝐸𝑅n) and it was found that the accuracy increases with increasi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
. International Journal Of Computer Science And Mobile Computing
A Hybrid Lossy Image Compression based on Wavelet Transform, Polynomial Approximation Model, Bit Plane Slicing and Absolute Moment Block Truncation
...Show More Authors

Publication Date
Tue Dec 01 2020
Journal Name
Systematic Reviews In Pharmacy
A Study On The Effects Of Risk Factors On The Pathology And The Development Of Breast Cancer In Iraqi Women
...Show More Authors

Breast cancer is one of the most important malignant diseases all over the world. The incidence of breast cancer is increasing around the world and it is still the leading cause of cancer mortality An Approximately 1.3 million new cases were diagnosed worldwide last year. With areas rising increasing, risk factors for breast cancer including obesity, early menarche, alcohol and smoking, environmental contamination and reduced or late birth rates become more prevalent. In Iraq, breast cancer ranks first among types of cancers diagnosed in women. This study was conducted on one hundred twenty women with breast cancer that was evaluated and investigated for the possible role of the risk factors on the development of breast cancer in females. T

... Show More